
Change ClusterMap API object to support multiple kubeconfig sources for a cluster. If one kubeconfig source fails, kubeconfig builder will not fail and move on to the next one. This behaviour will allow to support cases when ephemeral cluster is not accesible anymore or when target cluster is not yet accessible. For more information please read issue #460 in airshipctl github Relates-To: #460 Related-To: #460 Change-Id: I7cd32f78cd7c4ad8814eac357424c24216f40d76
311 lines
8.8 KiB
Go
311 lines
8.8 KiB
Go
/*
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
https://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package executors_test
|
|
|
|
import (
|
|
"bytes"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"opendev.org/airship/airshipctl/pkg/api/v1alpha1"
|
|
"opendev.org/airship/airshipctl/pkg/cluster/clustermap"
|
|
"opendev.org/airship/airshipctl/pkg/document"
|
|
"opendev.org/airship/airshipctl/pkg/events"
|
|
"opendev.org/airship/airshipctl/pkg/fs"
|
|
"opendev.org/airship/airshipctl/pkg/k8s/kubeconfig"
|
|
"opendev.org/airship/airshipctl/pkg/k8s/utils"
|
|
"opendev.org/airship/airshipctl/pkg/phase/executors"
|
|
"opendev.org/airship/airshipctl/pkg/phase/ifc"
|
|
testfs "opendev.org/airship/airshipctl/testutil/fs"
|
|
)
|
|
|
|
const (
|
|
ValidExecutorDoc = `apiVersion: airshipit.org/v1alpha1
|
|
kind: KubernetesApply
|
|
metadata:
|
|
labels:
|
|
airshipit.org/deploy-k8s: "false"
|
|
name: kubernetes-apply
|
|
config:
|
|
waitOptions:
|
|
timeout: 600
|
|
pruneOptions:
|
|
prune: false
|
|
`
|
|
ValidExecutorDocNamespaced = `apiVersion: airshipit.org/v1alpha1
|
|
kind: KubernetesApply
|
|
metadata:
|
|
labels:
|
|
airshipit.org/deploy-k8s: "false"
|
|
name: kubernetes-apply-namespaced
|
|
namespace: bundle
|
|
config:
|
|
waitOptions:
|
|
timeout: 600
|
|
pruneOptions:
|
|
prune: false
|
|
`
|
|
testValidKubeconfig = `apiVersion: v1
|
|
clusters:
|
|
- cluster:
|
|
certificate-authority-data: ca-data
|
|
server: https://10.0.1.7:6443
|
|
name: kubernetes_target
|
|
contexts:
|
|
- context:
|
|
cluster: kubernetes_target
|
|
user: kubernetes-admin
|
|
name: kubernetes-admin@kubernetes
|
|
current-context: ""
|
|
kind: Config
|
|
preferences: {}
|
|
users:
|
|
- name: kubernetes-admin
|
|
user:
|
|
client-certificate-data: cert-data
|
|
client-key-data: client-keydata
|
|
`
|
|
)
|
|
|
|
func TestNewKubeApplierExecutor(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
cfgDoc string
|
|
expectedErr string
|
|
helper ifc.Helper
|
|
kubeconf kubeconfig.Interface
|
|
bundleFactory document.BundleFactoryFunc
|
|
}{
|
|
{
|
|
name: "valid executor",
|
|
cfgDoc: ValidExecutorDoc,
|
|
kubeconf: testKubeconfig(testValidKubeconfig),
|
|
helper: makeDefaultHelper(t, "../../k8s/applier/testdata", defaultMetadataPath),
|
|
bundleFactory: testBundleFactory("../../k8s/applier/testdata/source_bundle"),
|
|
},
|
|
{
|
|
name: "wrong config document",
|
|
cfgDoc: `apiVersion: v1
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: first-map
|
|
namespace: default
|
|
labels:
|
|
cli-utils.sigs.k8s.io/inventory-id: "some id"`,
|
|
expectedErr: "wrong config document",
|
|
helper: makeDefaultHelper(t, "../../k8s/applier/testdata", defaultMetadataPath),
|
|
bundleFactory: testBundleFactory("../../k8s/applier/testdata/source_bundle"),
|
|
},
|
|
|
|
{
|
|
name: "path to bundle does not exist",
|
|
cfgDoc: ValidExecutorDoc,
|
|
expectedErr: "no such file or directory",
|
|
kubeconf: testKubeconfig(testValidKubeconfig),
|
|
helper: makeDefaultHelper(t, "../../k8s/applier/testdata", defaultMetadataPath),
|
|
bundleFactory: testBundleFactory("does not exist"),
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
doc, err := document.NewDocumentFromBytes([]byte(tt.cfgDoc))
|
|
require.NoError(t, err)
|
|
require.NotNil(t, doc)
|
|
|
|
exec, err := executors.NewKubeApplierExecutor(
|
|
ifc.ExecutorConfig{
|
|
ExecutorDocument: doc,
|
|
BundleFactory: tt.bundleFactory,
|
|
KubeConfig: tt.kubeconf,
|
|
Helper: tt.helper,
|
|
})
|
|
if tt.expectedErr != "" {
|
|
require.Error(t, err)
|
|
assert.Contains(t, err.Error(), "")
|
|
assert.Nil(t, exec)
|
|
} else {
|
|
require.NoError(t, err)
|
|
require.NotNil(t, exec)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TODO We need valid test that checks that actual bundle has arrived to applier
|
|
// for that we need a way to inject fake applier, which is not doable with `black box` test currently
|
|
// since we tests are in different package from executor
|
|
func TestKubeApplierExecutorRun(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
containsErr string
|
|
clusterName string
|
|
|
|
kubeconf kubeconfig.Interface
|
|
execDoc document.Document
|
|
bundleFactory document.BundleFactoryFunc
|
|
helper ifc.Helper
|
|
clusterMap clustermap.ClusterMap
|
|
}{
|
|
{
|
|
name: "cant read kubeconfig error",
|
|
containsErr: "no such file or directory",
|
|
helper: makeDefaultHelper(t, "../../k8s/applier/testdata", defaultMetadataPath),
|
|
bundleFactory: testBundleFactory("../../k8s/applier/testdata/source_bundle"),
|
|
kubeconf: testKubeconfig(`invalid kubeconfig`),
|
|
execDoc: executorDoc(t, ValidExecutorDocNamespaced),
|
|
clusterName: "ephemeral-cluster",
|
|
clusterMap: clustermap.NewClusterMap(&v1alpha1.ClusterMap{
|
|
Map: map[string]*v1alpha1.Cluster{
|
|
"ephemeral-cluster": {},
|
|
},
|
|
}),
|
|
},
|
|
{
|
|
name: "error cluster not defined",
|
|
containsErr: "is not defined in cluster map",
|
|
helper: makeDefaultHelper(t, "../../k8s/applier/testdata", defaultMetadataPath),
|
|
bundleFactory: testBundleFactory("../../k8s/applier/testdata/source_bundle"),
|
|
kubeconf: testKubeconfig(testValidKubeconfig),
|
|
execDoc: executorDoc(t, ValidExecutorDocNamespaced),
|
|
clusterMap: clustermap.NewClusterMap(v1alpha1.DefaultClusterMap()),
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
exec, err := executors.NewKubeApplierExecutor(
|
|
ifc.ExecutorConfig{
|
|
ExecutorDocument: tt.execDoc,
|
|
Helper: tt.helper,
|
|
BundleFactory: tt.bundleFactory,
|
|
KubeConfig: tt.kubeconf,
|
|
ClusterMap: tt.clusterMap,
|
|
ClusterName: tt.clusterName,
|
|
})
|
|
if tt.name == "Nil bundle provided" {
|
|
require.Error(t, err)
|
|
assert.Contains(t, err.Error(), tt.containsErr)
|
|
} else {
|
|
require.NoError(t, err)
|
|
require.NotNil(t, exec)
|
|
ch := make(chan events.Event)
|
|
go exec.Run(ch, ifc.RunOptions{})
|
|
processor := events.NewDefaultProcessor(utils.Streams())
|
|
err = processor.Process(ch)
|
|
if tt.containsErr != "" {
|
|
require.Error(t, err)
|
|
assert.Contains(t, err.Error(), tt.containsErr)
|
|
} else {
|
|
assert.NoError(t, err)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestRender(t *testing.T) {
|
|
execDoc, err := document.NewDocumentFromBytes([]byte(ValidExecutorDoc))
|
|
require.NoError(t, err)
|
|
require.NotNil(t, execDoc)
|
|
exec, err := executors.NewKubeApplierExecutor(ifc.ExecutorConfig{
|
|
BundleFactory: testBundleFactory("../../k8s/applier/testdata/source_bundle"),
|
|
ExecutorDocument: execDoc,
|
|
})
|
|
require.NoError(t, err)
|
|
require.NotNil(t, exec)
|
|
|
|
writerReader := bytes.NewBuffer([]byte{})
|
|
err = exec.Render(writerReader, ifc.RenderOptions{})
|
|
require.NoError(t, err)
|
|
|
|
result := writerReader.String()
|
|
assert.Contains(t, result, "ReplicationController")
|
|
}
|
|
|
|
func testKubeconfig(stringData string) kubeconfig.Interface {
|
|
return kubeconfig.NewKubeConfig(
|
|
kubeconfig.FromByte([]byte(stringData)),
|
|
kubeconfig.InjectFileSystem(
|
|
testfs.MockFileSystem{
|
|
MockTempFile: func(root, pattern string) (fs.File, error) {
|
|
return testfs.TestFile{
|
|
MockName: func() string { return "kubeconfig-142398" },
|
|
MockWrite: func() (int, error) { return 0, nil },
|
|
MockClose: func() error { return nil },
|
|
}, nil
|
|
},
|
|
MockRemoveAll: func() error { return nil },
|
|
},
|
|
))
|
|
}
|
|
|
|
func TestKubeApplierExecutor_Validate(t *testing.T) {
|
|
type fields struct {
|
|
BundleName string
|
|
path string
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "Error empty BundleName",
|
|
fields: fields{
|
|
path: "../../k8s/applier/testdata/source_bundle",
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "Error no documents",
|
|
fields: fields{BundleName: "some name",
|
|
path: "../../k8s/applier/testdata/no_bundle",
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "Success case",
|
|
fields: fields{BundleName: "some name",
|
|
path: "../../k8s/applier/testdata/source_bundle",
|
|
},
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, test := range tests {
|
|
tt := test
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
execDoc, err := document.NewDocumentFromBytes([]byte(ValidExecutorDoc))
|
|
require.NoError(t, err)
|
|
require.NotNil(t, execDoc)
|
|
|
|
e, err := executors.NewKubeApplierExecutor(ifc.ExecutorConfig{
|
|
BundleFactory: testBundleFactory(tt.fields.path),
|
|
PhaseName: tt.fields.BundleName,
|
|
ExecutorDocument: execDoc,
|
|
})
|
|
require.NoError(t, err)
|
|
require.NotNil(t, e)
|
|
|
|
if err := e.Validate(); (err != nil) != tt.wantErr {
|
|
t.Errorf("KubeApplierExecutor.Validate() error = %v, wantErr %v", err, tt.wantErr)
|
|
}
|
|
})
|
|
}
|
|
}
|